1// SPDX-License-Identifier: GPL-2.0-only
2/* Copyright(c) 2021 Intel Corporation. All rights reserved. */
3#include <linux/units.h>
4#include <linux/io-64-nonatomic-lo-hi.h>
5#include <linux/device.h>
6#include <linux/delay.h>
7#include <linux/pci.h>
8#include <linux/pci-doe.h>
9#include <linux/aer.h>
10#include <cxlpci.h>
11#include <cxlmem.h>
12#include <cxl.h>
13#include "core.h"
14#include "trace.h"
15
16/**
17 * DOC: cxl core pci
18 *
19 * Compute Express Link protocols are layered on top of PCIe. CXL core provides
20 * a set of helpers for CXL interactions which occur via PCIe.
21 */
22
23static unsigned short media_ready_timeout = 60;
24module_param(media_ready_timeout, ushort, 0644);
25MODULE_PARM_DESC(media_ready_timeout, "seconds to wait for media ready");
26
27struct cxl_walk_context {
28	struct pci_bus *bus;
29	struct cxl_port *port;
30	int type;
31	int error;
32	int count;
33};
34
35static int match_add_dports(struct pci_dev *pdev, void *data)
36{
37	struct cxl_walk_context *ctx = data;
38	struct cxl_port *port = ctx->port;
39	int type = pci_pcie_type(pdev);
40	struct cxl_register_map map;
41	struct cxl_dport *dport;
42	u32 lnkcap, port_num;
43	int rc;
44
45	if (pdev->bus != ctx->bus)
46		return 0;
47	if (!pci_is_pcie(pdev))
48		return 0;
49	if (type != ctx->type)
50		return 0;
51	if (pci_read_config_dword(pdev, pci_pcie_cap(pdev) + PCI_EXP_LNKCAP,
52				  &lnkcap))
53		return 0;
54
55	rc = cxl_find_regblock(pdev, CXL_REGLOC_RBI_COMPONENT, &map);
56	if (rc)
57		dev_dbg(&port->dev, "failed to find component registers\n");
58
59	port_num = FIELD_GET(PCI_EXP_LNKCAP_PN, lnkcap);
60	dport = devm_cxl_add_dport(port, &pdev->dev, port_num, map.resource);
61	if (IS_ERR(dport)) {
62		ctx->error = PTR_ERR(dport);
63		return PTR_ERR(dport);
64	}
65	ctx->count++;
66
67	return 0;
68}
69
70/**
71 * devm_cxl_port_enumerate_dports - enumerate downstream ports of the upstream port
72 * @port: cxl_port whose ->uport_dev is the upstream of dports to be enumerated
73 *
74 * Returns a positive number of dports enumerated or a negative error
75 * code.
76 */
77int devm_cxl_port_enumerate_dports(struct cxl_port *port)
78{
79	struct pci_bus *bus = cxl_port_to_pci_bus(port);
80	struct cxl_walk_context ctx;
81	int type;
82
83	if (!bus)
84		return -ENXIO;
85
86	if (pci_is_root_bus(bus))
87		type = PCI_EXP_TYPE_ROOT_PORT;
88	else
89		type = PCI_EXP_TYPE_DOWNSTREAM;
90
91	ctx = (struct cxl_walk_context) {
92		.port = port,
93		.bus = bus,
94		.type = type,
95	};
96	pci_walk_bus(bus, match_add_dports, &ctx);
97
98	if (ctx.count == 0)
99		return -ENODEV;
100	if (ctx.error)
101		return ctx.error;
102	return ctx.count;
103}
104EXPORT_SYMBOL_NS_GPL(devm_cxl_port_enumerate_dports, CXL);
105
106static int cxl_dvsec_mem_range_valid(struct cxl_dev_state *cxlds, int id)
107{
108	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
109	int d = cxlds->cxl_dvsec;
110	bool valid = false;
111	int rc, i;
112	u32 temp;
113
114	if (id > CXL_DVSEC_RANGE_MAX)
115		return -EINVAL;
116
117	/* Check MEM INFO VALID bit first, give up after 1s */
118	i = 1;
119	do {
120		rc = pci_read_config_dword(pdev,
121					   d + CXL_DVSEC_RANGE_SIZE_LOW(id),
122					   &temp);
123		if (rc)
124			return rc;
125
126		valid = FIELD_GET(CXL_DVSEC_MEM_INFO_VALID, temp);
127		if (valid)
128			break;
129		msleep(1000);
130	} while (i--);
131
132	if (!valid) {
133		dev_err(&pdev->dev,
134			"Timeout awaiting memory range %d valid after 1s.\n",
135			id);
136		return -ETIMEDOUT;
137	}
138
139	return 0;
140}
141
142static int cxl_dvsec_mem_range_active(struct cxl_dev_state *cxlds, int id)
143{
144	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
145	int d = cxlds->cxl_dvsec;
146	bool active = false;
147	int rc, i;
148	u32 temp;
149
150	if (id > CXL_DVSEC_RANGE_MAX)
151		return -EINVAL;
152
153	/* Check MEM ACTIVE bit, up to 60s timeout by default */
154	for (i = media_ready_timeout; i; i--) {
155		rc = pci_read_config_dword(
156			pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(id), &temp);
157		if (rc)
158			return rc;
159
160		active = FIELD_GET(CXL_DVSEC_MEM_ACTIVE, temp);
161		if (active)
162			break;
163		msleep(1000);
164	}
165
166	if (!active) {
167		dev_err(&pdev->dev,
168			"timeout awaiting memory active after %d seconds\n",
169			media_ready_timeout);
170		return -ETIMEDOUT;
171	}
172
173	return 0;
174}
175
176/*
177 * Wait up to @media_ready_timeout for the device to report memory
178 * active.
179 */
180int cxl_await_media_ready(struct cxl_dev_state *cxlds)
181{
182	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
183	int d = cxlds->cxl_dvsec;
184	int rc, i, hdm_count;
185	u64 md_status;
186	u16 cap;
187
188	rc = pci_read_config_word(pdev,
189				  d + CXL_DVSEC_CAP_OFFSET, &cap);
190	if (rc)
191		return rc;
192
193	hdm_count = FIELD_GET(CXL_DVSEC_HDM_COUNT_MASK, cap);
194	for (i = 0; i < hdm_count; i++) {
195		rc = cxl_dvsec_mem_range_valid(cxlds, i);
196		if (rc)
197			return rc;
198	}
199
200	for (i = 0; i < hdm_count; i++) {
201		rc = cxl_dvsec_mem_range_active(cxlds, i);
202		if (rc)
203			return rc;
204	}
205
206	md_status = readq(cxlds->regs.memdev + CXLMDEV_STATUS_OFFSET);
207	if (!CXLMDEV_READY(md_status))
208		return -EIO;
209
210	return 0;
211}
212EXPORT_SYMBOL_NS_GPL(cxl_await_media_ready, CXL);
213
214static int wait_for_valid(struct pci_dev *pdev, int d)
215{
216	u32 val;
217	int rc;
218
219	/*
220	 * Memory_Info_Valid: When set, indicates that the CXL Range 1 Size high
221	 * and Size Low registers are valid. Must be set within 1 second of
222	 * deassertion of reset to CXL device. Likely it is already set by the
223	 * time this runs, but otherwise give a 1.5 second timeout in case of
224	 * clock skew.
225	 */
226	rc = pci_read_config_dword(pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(0), &val);
227	if (rc)
228		return rc;
229
230	if (val & CXL_DVSEC_MEM_INFO_VALID)
231		return 0;
232
233	msleep(1500);
234
235	rc = pci_read_config_dword(pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(0), &val);
236	if (rc)
237		return rc;
238
239	if (val & CXL_DVSEC_MEM_INFO_VALID)
240		return 0;
241
242	return -ETIMEDOUT;
243}
244
245static int cxl_set_mem_enable(struct cxl_dev_state *cxlds, u16 val)
246{
247	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
248	int d = cxlds->cxl_dvsec;
249	u16 ctrl;
250	int rc;
251
252	rc = pci_read_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, &ctrl);
253	if (rc < 0)
254		return rc;
255
256	if ((ctrl & CXL_DVSEC_MEM_ENABLE) == val)
257		return 1;
258	ctrl &= ~CXL_DVSEC_MEM_ENABLE;
259	ctrl |= val;
260
261	rc = pci_write_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, ctrl);
262	if (rc < 0)
263		return rc;
264
265	return 0;
266}
267
268static void clear_mem_enable(void *cxlds)
269{
270	cxl_set_mem_enable(cxlds, 0);
271}
272
273static int devm_cxl_enable_mem(struct device *host, struct cxl_dev_state *cxlds)
274{
275	int rc;
276
277	rc = cxl_set_mem_enable(cxlds, CXL_DVSEC_MEM_ENABLE);
278	if (rc < 0)
279		return rc;
280	if (rc > 0)
281		return 0;
282	return devm_add_action_or_reset(host, clear_mem_enable, cxlds);
283}
284
285/* require dvsec ranges to be covered by a locked platform window */
286static int dvsec_range_allowed(struct device *dev, void *arg)
287{
288	struct range *dev_range = arg;
289	struct cxl_decoder *cxld;
290
291	if (!is_root_decoder(dev))
292		return 0;
293
294	cxld = to_cxl_decoder(dev);
295
296	if (!(cxld->flags & CXL_DECODER_F_RAM))
297		return 0;
298
299	return range_contains(&cxld->hpa_range, dev_range);
300}
301
302static void disable_hdm(void *_cxlhdm)
303{
304	u32 global_ctrl;
305	struct cxl_hdm *cxlhdm = _cxlhdm;
306	void __iomem *hdm = cxlhdm->regs.hdm_decoder;
307
308	global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
309	writel(global_ctrl & ~CXL_HDM_DECODER_ENABLE,
310	       hdm + CXL_HDM_DECODER_CTRL_OFFSET);
311}
312
313static int devm_cxl_enable_hdm(struct device *host, struct cxl_hdm *cxlhdm)
314{
315	void __iomem *hdm = cxlhdm->regs.hdm_decoder;
316	u32 global_ctrl;
317
318	global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
319	writel(global_ctrl | CXL_HDM_DECODER_ENABLE,
320	       hdm + CXL_HDM_DECODER_CTRL_OFFSET);
321
322	return devm_add_action_or_reset(host, disable_hdm, cxlhdm);
323}
324
325int cxl_dvsec_rr_decode(struct device *dev, int d,
326			struct cxl_endpoint_dvsec_info *info)
327{
328	struct pci_dev *pdev = to_pci_dev(dev);
329	int hdm_count, rc, i, ranges = 0;
330	u16 cap, ctrl;
331
332	if (!d) {
333		dev_dbg(dev, "No DVSEC Capability\n");
334		return -ENXIO;
335	}
336
337	rc = pci_read_config_word(pdev, d + CXL_DVSEC_CAP_OFFSET, &cap);
338	if (rc)
339		return rc;
340
341	rc = pci_read_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, &ctrl);
342	if (rc)
343		return rc;
344
345	if (!(cap & CXL_DVSEC_MEM_CAPABLE)) {
346		dev_dbg(dev, "Not MEM Capable\n");
347		return -ENXIO;
348	}
349
350	/*
351	 * It is not allowed by spec for MEM.capable to be set and have 0 legacy
352	 * HDM decoders (values > 2 are also undefined as of CXL 2.0). As this
353	 * driver is for a spec defined class code which must be CXL.mem
354	 * capable, there is no point in continuing to enable CXL.mem.
355	 */
356	hdm_count = FIELD_GET(CXL_DVSEC_HDM_COUNT_MASK, cap);
357	if (!hdm_count || hdm_count > 2)
358		return -EINVAL;
359
360	rc = wait_for_valid(pdev, d);
361	if (rc) {
362		dev_dbg(dev, "Failure awaiting MEM_INFO_VALID (%d)\n", rc);
363		return rc;
364	}
365
366	/*
367	 * The current DVSEC values are moot if the memory capability is
368	 * disabled, and they will remain moot after the HDM Decoder
369	 * capability is enabled.
370	 */
371	info->mem_enabled = FIELD_GET(CXL_DVSEC_MEM_ENABLE, ctrl);
372	if (!info->mem_enabled)
373		return 0;
374
375	for (i = 0; i < hdm_count; i++) {
376		u64 base, size;
377		u32 temp;
378
379		rc = pci_read_config_dword(
380			pdev, d + CXL_DVSEC_RANGE_SIZE_HIGH(i), &temp);
381		if (rc)
382			return rc;
383
384		size = (u64)temp << 32;
385
386		rc = pci_read_config_dword(
387			pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(i), &temp);
388		if (rc)
389			return rc;
390
391		size |= temp & CXL_DVSEC_MEM_SIZE_LOW_MASK;
392		if (!size) {
393			info->dvsec_range[i] = (struct range) {
394				.start = 0,
395				.end = CXL_RESOURCE_NONE,
396			};
397			continue;
398		}
399
400		rc = pci_read_config_dword(
401			pdev, d + CXL_DVSEC_RANGE_BASE_HIGH(i), &temp);
402		if (rc)
403			return rc;
404
405		base = (u64)temp << 32;
406
407		rc = pci_read_config_dword(
408			pdev, d + CXL_DVSEC_RANGE_BASE_LOW(i), &temp);
409		if (rc)
410			return rc;
411
412		base |= temp & CXL_DVSEC_MEM_BASE_LOW_MASK;
413
414		info->dvsec_range[i] = (struct range) {
415			.start = base,
416			.end = base + size - 1
417		};
418
419		ranges++;
420	}
421
422	info->ranges = ranges;
423
424	return 0;
425}
426EXPORT_SYMBOL_NS_GPL(cxl_dvsec_rr_decode, CXL);
427
428/**
429 * cxl_hdm_decode_init() - Setup HDM decoding for the endpoint
430 * @cxlds: Device state
431 * @cxlhdm: Mapped HDM decoder Capability
432 * @info: Cached DVSEC range registers info
433 *
434 * Try to enable the endpoint's HDM Decoder Capability
435 */
436int cxl_hdm_decode_init(struct cxl_dev_state *cxlds, struct cxl_hdm *cxlhdm,
437			struct cxl_endpoint_dvsec_info *info)
438{
439	void __iomem *hdm = cxlhdm->regs.hdm_decoder;
440	struct cxl_port *port = cxlhdm->port;
441	struct device *dev = cxlds->dev;
442	struct cxl_port *root;
443	int i, rc, allowed;
444	u32 global_ctrl = 0;
445
446	if (hdm)
447		global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
448
449	/*
450	 * If the HDM Decoder Capability is already enabled then assume
451	 * that some other agent like platform firmware set it up.
452	 */
453	if (global_ctrl & CXL_HDM_DECODER_ENABLE || (!hdm && info->mem_enabled))
454		return devm_cxl_enable_mem(&port->dev, cxlds);
455	else if (!hdm)
456		return -ENODEV;
457
458	root = to_cxl_port(port->dev.parent);
459	while (!is_cxl_root(root) && is_cxl_port(root->dev.parent))
460		root = to_cxl_port(root->dev.parent);
461	if (!is_cxl_root(root)) {
462		dev_err(dev, "Failed to acquire root port for HDM enable\n");
463		return -ENODEV;
464	}
465
466	for (i = 0, allowed = 0; info->mem_enabled && i < info->ranges; i++) {
467		struct device *cxld_dev;
468
469		cxld_dev = device_find_child(&root->dev, &info->dvsec_range[i],
470					     dvsec_range_allowed);
471		if (!cxld_dev) {
472			dev_dbg(dev, "DVSEC Range%d denied by platform\n", i);
473			continue;
474		}
475		dev_dbg(dev, "DVSEC Range%d allowed by platform\n", i);
476		put_device(cxld_dev);
477		allowed++;
478	}
479
480	if (!allowed && info->mem_enabled) {
481		dev_err(dev, "Range register decodes outside platform defined CXL ranges.\n");
482		return -ENXIO;
483	}
484
485	/*
486	 * Per CXL 2.0 Section 8.1.3.8.3 and 8.1.3.8.4 DVSEC CXL Range 1 Base
487	 * [High,Low] when HDM operation is enabled the range register values
488	 * are ignored by the device, but the spec also recommends matching the
489	 * DVSEC Range 1,2 to HDM Decoder Range 0,1. So, non-zero info->ranges
490	 * are expected even though Linux does not require or maintain that
491	 * match. If at least one DVSEC range is enabled and allowed, skip HDM
492	 * Decoder Capability Enable.
493	 */
494	if (info->mem_enabled)
495		return 0;
496
497	rc = devm_cxl_enable_hdm(&port->dev, cxlhdm);
498	if (rc)
499		return rc;
500
501	return devm_cxl_enable_mem(&port->dev, cxlds);
502}
503EXPORT_SYMBOL_NS_GPL(cxl_hdm_decode_init, CXL);
504
505#define CXL_DOE_TABLE_ACCESS_REQ_CODE		0x000000ff
506#define   CXL_DOE_TABLE_ACCESS_REQ_CODE_READ	0
507#define CXL_DOE_TABLE_ACCESS_TABLE_TYPE		0x0000ff00
508#define   CXL_DOE_TABLE_ACCESS_TABLE_TYPE_CDATA	0
509#define CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE	0xffff0000
510#define CXL_DOE_TABLE_ACCESS_LAST_ENTRY		0xffff
511#define CXL_DOE_PROTOCOL_TABLE_ACCESS 2
512
513#define CDAT_DOE_REQ(entry_handle) cpu_to_le32				\
514	(FIELD_PREP(CXL_DOE_TABLE_ACCESS_REQ_CODE,			\
515		    CXL_DOE_TABLE_ACCESS_REQ_CODE_READ) |		\
516	 FIELD_PREP(CXL_DOE_TABLE_ACCESS_TABLE_TYPE,			\
517		    CXL_DOE_TABLE_ACCESS_TABLE_TYPE_CDATA) |		\
518	 FIELD_PREP(CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE, (entry_handle)))
519
520static int cxl_cdat_get_length(struct device *dev,
521			       struct pci_doe_mb *doe_mb,
522			       size_t *length)
523{
524	__le32 request = CDAT_DOE_REQ(0);
525	__le32 response[2];
526	int rc;
527
528	rc = pci_doe(doe_mb, PCI_DVSEC_VENDOR_ID_CXL,
529		     CXL_DOE_PROTOCOL_TABLE_ACCESS,
530		     &request, sizeof(request),
531		     &response, sizeof(response));
532	if (rc < 0) {
533		dev_err(dev, "DOE failed: %d", rc);
534		return rc;
535	}
536	if (rc < sizeof(response))
537		return -EIO;
538
539	*length = le32_to_cpu(response[1]);
540	dev_dbg(dev, "CDAT length %zu\n", *length);
541
542	return 0;
543}
544
545static int cxl_cdat_read_table(struct device *dev,
546			       struct pci_doe_mb *doe_mb,
547			       struct cdat_doe_rsp *rsp, size_t *length)
548{
549	size_t received, remaining = *length;
550	unsigned int entry_handle = 0;
551	union cdat_data *data;
552	__le32 saved_dw = 0;
553
554	do {
555		__le32 request = CDAT_DOE_REQ(entry_handle);
556		int rc;
557
558		rc = pci_doe(doe_mb, PCI_DVSEC_VENDOR_ID_CXL,
559			     CXL_DOE_PROTOCOL_TABLE_ACCESS,
560			     &request, sizeof(request),
561			     rsp, sizeof(*rsp) + remaining);
562		if (rc < 0) {
563			dev_err(dev, "DOE failed: %d", rc);
564			return rc;
565		}
566
567		if (rc < sizeof(*rsp))
568			return -EIO;
569
570		data = (union cdat_data *)rsp->data;
571		received = rc - sizeof(*rsp);
572
573		if (entry_handle == 0) {
574			if (received != sizeof(data->header))
575				return -EIO;
576		} else {
577			if (received < sizeof(data->entry) ||
578			    received != le16_to_cpu(data->entry.length))
579				return -EIO;
580		}
581
582		/* Get the CXL table access header entry handle */
583		entry_handle = FIELD_GET(CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE,
584					 le32_to_cpu(rsp->doe_header));
585
586		/*
587		 * Table Access Response Header overwrote the last DW of
588		 * previous entry, so restore that DW
589		 */
590		rsp->doe_header = saved_dw;
591		remaining -= received;
592		rsp = (void *)rsp + received;
593		saved_dw = rsp->doe_header;
594	} while (entry_handle != CXL_DOE_TABLE_ACCESS_LAST_ENTRY);
595
596	/* Length in CDAT header may exceed concatenation of CDAT entries */
597	*length -= remaining;
598
599	return 0;
600}
601
602static unsigned char cdat_checksum(void *buf, size_t size)
603{
604	unsigned char sum, *data = buf;
605	size_t i;
606
607	for (sum = 0, i = 0; i < size; i++)
608		sum += data[i];
609	return sum;
610}
611
612/**
613 * read_cdat_data - Read the CDAT data on this port
614 * @port: Port to read data from
615 *
616 * This call will sleep waiting for responses from the DOE mailbox.
617 */
618void read_cdat_data(struct cxl_port *port)
619{
620	struct device *uport = port->uport_dev;
621	struct device *dev = &port->dev;
622	struct pci_doe_mb *doe_mb;
623	struct pci_dev *pdev = NULL;
624	struct cxl_memdev *cxlmd;
625	struct cdat_doe_rsp *buf;
626	size_t table_length, length;
627	int rc;
628
629	if (is_cxl_memdev(uport)) {
630		struct device *host;
631
632		cxlmd = to_cxl_memdev(uport);
633		host = cxlmd->dev.parent;
634		if (dev_is_pci(host))
635			pdev = to_pci_dev(host);
636	} else if (dev_is_pci(uport)) {
637		pdev = to_pci_dev(uport);
638	}
639
640	if (!pdev)
641		return;
642
643	doe_mb = pci_find_doe_mailbox(pdev, PCI_DVSEC_VENDOR_ID_CXL,
644				      CXL_DOE_PROTOCOL_TABLE_ACCESS);
645	if (!doe_mb) {
646		dev_dbg(dev, "No CDAT mailbox\n");
647		return;
648	}
649
650	port->cdat_available = true;
651
652	if (cxl_cdat_get_length(dev, doe_mb, &length)) {
653		dev_dbg(dev, "No CDAT length\n");
654		return;
655	}
656
657	/*
658	 * The begin of the CDAT buffer needs space for additional 4
659	 * bytes for the DOE header. Table data starts afterwards.
660	 */
661	buf = devm_kzalloc(dev, sizeof(*buf) + length, GFP_KERNEL);
662	if (!buf)
663		goto err;
664
665	table_length = length;
666
667	rc = cxl_cdat_read_table(dev, doe_mb, buf, &length);
668	if (rc)
669		goto err;
670
671	if (table_length != length)
672		dev_warn(dev, "Malformed CDAT table length (%zu:%zu), discarding trailing data\n",
673			table_length, length);
674
675	if (cdat_checksum(buf->data, length))
676		goto err;
677
678	port->cdat.table = buf->data;
679	port->cdat.length = length;
680
681	return;
682err:
683	/* Don't leave table data allocated on error */
684	devm_kfree(dev, buf);
685	dev_err(dev, "Failed to read/validate CDAT.\n");
686}
687EXPORT_SYMBOL_NS_GPL(read_cdat_data, CXL);
688
689static void __cxl_handle_cor_ras(struct cxl_dev_state *cxlds,
690				 void __iomem *ras_base)
691{
692	void __iomem *addr;
693	u32 status;
694
695	if (!ras_base)
696		return;
697
698	addr = ras_base + CXL_RAS_CORRECTABLE_STATUS_OFFSET;
699	status = readl(addr);
700	if (status & CXL_RAS_CORRECTABLE_STATUS_MASK) {
701		writel(status & CXL_RAS_CORRECTABLE_STATUS_MASK, addr);
702		trace_cxl_aer_correctable_error(cxlds->cxlmd, status);
703	}
704}
705
706static void cxl_handle_endpoint_cor_ras(struct cxl_dev_state *cxlds)
707{
708	return __cxl_handle_cor_ras(cxlds, cxlds->regs.ras);
709}
710
711/* CXL spec rev3.0 8.2.4.16.1 */
712static void header_log_copy(void __iomem *ras_base, u32 *log)
713{
714	void __iomem *addr;
715	u32 *log_addr;
716	int i, log_u32_size = CXL_HEADERLOG_SIZE / sizeof(u32);
717
718	addr = ras_base + CXL_RAS_HEADER_LOG_OFFSET;
719	log_addr = log;
720
721	for (i = 0; i < log_u32_size; i++) {
722		*log_addr = readl(addr);
723		log_addr++;
724		addr += sizeof(u32);
725	}
726}
727
728/*
729 * Log the state of the RAS status registers and prepare them to log the
730 * next error status. Return 1 if reset needed.
731 */
732static bool __cxl_handle_ras(struct cxl_dev_state *cxlds,
733				  void __iomem *ras_base)
734{
735	u32 hl[CXL_HEADERLOG_SIZE_U32];
736	void __iomem *addr;
737	u32 status;
738	u32 fe;
739
740	if (!ras_base)
741		return false;
742
743	addr = ras_base + CXL_RAS_UNCORRECTABLE_STATUS_OFFSET;
744	status = readl(addr);
745	if (!(status & CXL_RAS_UNCORRECTABLE_STATUS_MASK))
746		return false;
747
748	/* If multiple errors, log header points to first error from ctrl reg */
749	if (hweight32(status) > 1) {
750		void __iomem *rcc_addr =
751			ras_base + CXL_RAS_CAP_CONTROL_OFFSET;
752
753		fe = BIT(FIELD_GET(CXL_RAS_CAP_CONTROL_FE_MASK,
754				   readl(rcc_addr)));
755	} else {
756		fe = status;
757	}
758
759	header_log_copy(ras_base, hl);
760	trace_cxl_aer_uncorrectable_error(cxlds->cxlmd, status, fe, hl);
761	writel(status & CXL_RAS_UNCORRECTABLE_STATUS_MASK, addr);
762
763	return true;
764}
765
766static bool cxl_handle_endpoint_ras(struct cxl_dev_state *cxlds)
767{
768	return __cxl_handle_ras(cxlds, cxlds->regs.ras);
769}
770
771#ifdef CONFIG_PCIEAER_CXL
772
773static void cxl_dport_map_rch_aer(struct cxl_dport *dport)
774{
775	struct cxl_rcrb_info *ri = &dport->rcrb;
776	void __iomem *dport_aer = NULL;
777	resource_size_t aer_phys;
778	struct device *host;
779
780	if (dport->rch && ri->aer_cap) {
781		host = dport->reg_map.host;
782		aer_phys = ri->aer_cap + ri->base;
783		dport_aer = devm_cxl_iomap_block(host, aer_phys,
784				sizeof(struct aer_capability_regs));
785	}
786
787	dport->regs.dport_aer = dport_aer;
788}
789
790static void cxl_dport_map_regs(struct cxl_dport *dport)
791{
792	struct cxl_register_map *map = &dport->reg_map;
793	struct device *dev = dport->dport_dev;
794
795	if (!map->component_map.ras.valid)
796		dev_dbg(dev, "RAS registers not found\n");
797	else if (cxl_map_component_regs(map, &dport->regs.component,
798					BIT(CXL_CM_CAP_CAP_ID_RAS)))
799		dev_dbg(dev, "Failed to map RAS capability.\n");
800
801	if (dport->rch)
802		cxl_dport_map_rch_aer(dport);
803}
804
805static void cxl_disable_rch_root_ints(struct cxl_dport *dport)
806{
807	void __iomem *aer_base = dport->regs.dport_aer;
808	struct pci_host_bridge *bridge;
809	u32 aer_cmd_mask, aer_cmd;
810
811	if (!aer_base)
812		return;
813
814	bridge = to_pci_host_bridge(dport->dport_dev);
815
816	/*
817	 * Disable RCH root port command interrupts.
818	 * CXL 3.0 12.2.1.1 - RCH Downstream Port-detected Errors
819	 *
820	 * This sequence may not be necessary. CXL spec states disabling
821	 * the root cmd register's interrupts is required. But, PCI spec
822	 * shows these are disabled by default on reset.
823	 */
824	if (bridge->native_aer) {
825		aer_cmd_mask = (PCI_ERR_ROOT_CMD_COR_EN |
826				PCI_ERR_ROOT_CMD_NONFATAL_EN |
827				PCI_ERR_ROOT_CMD_FATAL_EN);
828		aer_cmd = readl(aer_base + PCI_ERR_ROOT_COMMAND);
829		aer_cmd &= ~aer_cmd_mask;
830		writel(aer_cmd, aer_base + PCI_ERR_ROOT_COMMAND);
831	}
832}
833
834void cxl_setup_parent_dport(struct device *host, struct cxl_dport *dport)
835{
836	struct device *dport_dev = dport->dport_dev;
837	struct pci_host_bridge *host_bridge;
838
839	host_bridge = to_pci_host_bridge(dport_dev);
840	if (host_bridge->native_aer)
841		dport->rcrb.aer_cap = cxl_rcrb_to_aer(dport_dev, dport->rcrb.base);
842
843	dport->reg_map.host = host;
844	cxl_dport_map_regs(dport);
845
846	if (dport->rch)
847		cxl_disable_rch_root_ints(dport);
848}
849EXPORT_SYMBOL_NS_GPL(cxl_setup_parent_dport, CXL);
850
851static void cxl_handle_rdport_cor_ras(struct cxl_dev_state *cxlds,
852					  struct cxl_dport *dport)
853{
854	return __cxl_handle_cor_ras(cxlds, dport->regs.ras);
855}
856
857static bool cxl_handle_rdport_ras(struct cxl_dev_state *cxlds,
858				       struct cxl_dport *dport)
859{
860	return __cxl_handle_ras(cxlds, dport->regs.ras);
861}
862
863/*
864 * Copy the AER capability registers using 32 bit read accesses.
865 * This is necessary because RCRB AER capability is MMIO mapped. Clear the
866 * status after copying.
867 *
868 * @aer_base: base address of AER capability block in RCRB
869 * @aer_regs: destination for copying AER capability
870 */
871static bool cxl_rch_get_aer_info(void __iomem *aer_base,
872				 struct aer_capability_regs *aer_regs)
873{
874	int read_cnt = sizeof(struct aer_capability_regs) / sizeof(u32);
875	u32 *aer_regs_buf = (u32 *)aer_regs;
876	int n;
877
878	if (!aer_base)
879		return false;
880
881	/* Use readl() to guarantee 32-bit accesses */
882	for (n = 0; n < read_cnt; n++)
883		aer_regs_buf[n] = readl(aer_base + n * sizeof(u32));
884
885	writel(aer_regs->uncor_status, aer_base + PCI_ERR_UNCOR_STATUS);
886	writel(aer_regs->cor_status, aer_base + PCI_ERR_COR_STATUS);
887
888	return true;
889}
890
891/* Get AER severity. Return false if there is no error. */
892static bool cxl_rch_get_aer_severity(struct aer_capability_regs *aer_regs,
893				     int *severity)
894{
895	if (aer_regs->uncor_status & ~aer_regs->uncor_mask) {
896		if (aer_regs->uncor_status & PCI_ERR_ROOT_FATAL_RCV)
897			*severity = AER_FATAL;
898		else
899			*severity = AER_NONFATAL;
900		return true;
901	}
902
903	if (aer_regs->cor_status & ~aer_regs->cor_mask) {
904		*severity = AER_CORRECTABLE;
905		return true;
906	}
907
908	return false;
909}
910
911static void cxl_handle_rdport_errors(struct cxl_dev_state *cxlds)
912{
913	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
914	struct aer_capability_regs aer_regs;
915	struct cxl_dport *dport;
916	struct cxl_port *port;
917	int severity;
918
919	port = cxl_pci_find_port(pdev, &dport);
920	if (!port)
921		return;
922
923	put_device(&port->dev);
924
925	if (!cxl_rch_get_aer_info(dport->regs.dport_aer, &aer_regs))
926		return;
927
928	if (!cxl_rch_get_aer_severity(&aer_regs, &severity))
929		return;
930
931	pci_print_aer(pdev, severity, &aer_regs);
932
933	if (severity == AER_CORRECTABLE)
934		cxl_handle_rdport_cor_ras(cxlds, dport);
935	else
936		cxl_handle_rdport_ras(cxlds, dport);
937}
938
939#else
940static void cxl_handle_rdport_errors(struct cxl_dev_state *cxlds) { }
941#endif
942
943void cxl_cor_error_detected(struct pci_dev *pdev)
944{
945	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
946	struct device *dev = &cxlds->cxlmd->dev;
947
948	scoped_guard(device, dev) {
949		if (!dev->driver) {
950			dev_warn(&pdev->dev,
951				 "%s: memdev disabled, abort error handling\n",
952				 dev_name(dev));
953			return;
954		}
955
956		if (cxlds->rcd)
957			cxl_handle_rdport_errors(cxlds);
958
959		cxl_handle_endpoint_cor_ras(cxlds);
960	}
961}
962EXPORT_SYMBOL_NS_GPL(cxl_cor_error_detected, CXL);
963
964pci_ers_result_t cxl_error_detected(struct pci_dev *pdev,
965				    pci_channel_state_t state)
966{
967	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
968	struct cxl_memdev *cxlmd = cxlds->cxlmd;
969	struct device *dev = &cxlmd->dev;
970	bool ue;
971
972	scoped_guard(device, dev) {
973		if (!dev->driver) {
974			dev_warn(&pdev->dev,
975				 "%s: memdev disabled, abort error handling\n",
976				 dev_name(dev));
977			return PCI_ERS_RESULT_DISCONNECT;
978		}
979
980		if (cxlds->rcd)
981			cxl_handle_rdport_errors(cxlds);
982		/*
983		 * A frozen channel indicates an impending reset which is fatal to
984		 * CXL.mem operation, and will likely crash the system. On the off
985		 * chance the situation is recoverable dump the status of the RAS
986		 * capability registers and bounce the active state of the memdev.
987		 */
988		ue = cxl_handle_endpoint_ras(cxlds);
989	}
990
991
992	switch (state) {
993	case pci_channel_io_normal:
994		if (ue) {
995			device_release_driver(dev);
996			return PCI_ERS_RESULT_NEED_RESET;
997		}
998		return PCI_ERS_RESULT_CAN_RECOVER;
999	case pci_channel_io_frozen:
1000		dev_warn(&pdev->dev,
1001			 "%s: frozen state error detected, disable CXL.mem\n",
1002			 dev_name(dev));
1003		device_release_driver(dev);
1004		return PCI_ERS_RESULT_NEED_RESET;
1005	case pci_channel_io_perm_failure:
1006		dev_warn(&pdev->dev,
1007			 "failure state error detected, request disconnect\n");
1008		return PCI_ERS_RESULT_DISCONNECT;
1009	}
1010	return PCI_ERS_RESULT_NEED_RESET;
1011}
1012EXPORT_SYMBOL_NS_GPL(cxl_error_detected, CXL);
1013
1014static int cxl_flit_size(struct pci_dev *pdev)
1015{
1016	if (cxl_pci_flit_256(pdev))
1017		return 256;
1018
1019	return 68;
1020}
1021
1022/**
1023 * cxl_pci_get_latency - calculate the link latency for the PCIe link
1024 * @pdev: PCI device
1025 *
1026 * return: calculated latency or 0 for no latency
1027 *
1028 * CXL Memory Device SW Guide v1.0 2.11.4 Link latency calculation
1029 * Link latency = LinkPropagationLatency + FlitLatency + RetimerLatency
1030 * LinkProgationLatency is negligible, so 0 will be used
1031 * RetimerLatency is assumed to be negligible and 0 will be used
1032 * FlitLatency = FlitSize / LinkBandwidth
1033 * FlitSize is defined by spec. CXL rev3.0 4.2.1.
1034 * 68B flit is used up to 32GT/s. >32GT/s, 256B flit size is used.
1035 * The FlitLatency is converted to picoseconds.
1036 */
1037long cxl_pci_get_latency(struct pci_dev *pdev)
1038{
1039	long bw;
1040
1041	bw = pcie_link_speed_mbps(pdev);
1042	if (bw < 0)
1043		return 0;
1044	bw /= BITS_PER_BYTE;
1045
1046	return cxl_flit_size(pdev) * MEGA / bw;
1047}
1048